scholarly journals Access control requirements engineering, modeling and verification in multi-domain grid and cloud computing systems

2013 ◽  
Author(s):  
Antonios Gouglidis
2020 ◽  
Vol 6 (18) ◽  
pp. 165236 ◽  
Author(s):  
Wen Zeng ◽  
Reem Bashir ◽  
Trevor Wood ◽  
Francois Siewe ◽  
Helge Janicke ◽  
...  

2019 ◽  
Vol 8 (3) ◽  
pp. 7721-7726

Agronomy is the cornerstone of nation encountering untimely obstacles in the present scenario. Transducer nexus and their deployment in Farm Monitoring is the major utility for the nation. As agriculture is utmost provenance of nourishment, as there is a necessity to lessen the tariff and human interventions by enlarging productivity. This paper deals with advancement of IoT which lessens the endeavors of human by machine to machine interactions (corroborate through cloud based networks).The consumption of solar power by various devices can be monitored with the help of microcontroller interfaced to sensors and transmit the data through Wi-Fi devices which is stored in cloud based system. Process of irrigation is carried out in various methods using transducers which results in the distinguishing of soil moisture and temperature along with humidity conditions and it also authorizes the user to supervise the gadgets from remote locations using cloud computing systems provided with procured login credentials allocates access to know the status of all the installations through Laptop/PC/Mobile/Tablet.[1]


2021 ◽  
Author(s):  
Shadha Mohamed Sulaiyam ALAmri

Cybersecurity is a critical issue as the world is moving towered IR4 era (Industrial Revaluation 4.0) where technology is involved, and access to the internet is an imperative need. The traditional computing systems are not able to meet the huge computing demand and growing data (Big-Data). Therefore; new technologies have been evolved such as cloud computing. This chapter is exploring the need for a dynamic access control approach to enhance the Cybersecurity. The scope in this chapter is focusing on IaaS (Infrastructure as a Service) layer of cloud computing. The research approach aims to enhance the basic ABAC (Attribute-Based Access Control) model by adding a context-aware feature and SoD principle. The enhanced model called ABACsh. This proposed enhancement is implemented through a framework based on AI (Artificial Intelligent) to meet the requirements of dynamic systems. The framework is tested in the OpenStack testbed. The results show better performance in the term of computation speed.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


Sign in / Sign up

Export Citation Format

Share Document